CN108010519A - A kind of information search method and system - Google Patents

A kind of information search method and system Download PDF

Info

Publication number
CN108010519A
CN108010519A CN201711104137.1A CN201711104137A CN108010519A CN 108010519 A CN108010519 A CN 108010519A CN 201711104137 A CN201711104137 A CN 201711104137A CN 108010519 A CN108010519 A CN 108010519A
Authority
CN
China
Prior art keywords
information
user
vocal print
search
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711104137.1A
Other languages
Chinese (zh)
Inventor
谢文娟
张志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201711104137.1A priority Critical patent/CN108010519A/en
Publication of CN108010519A publication Critical patent/CN108010519A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72433User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for voice messaging, e.g. dictaphones

Abstract

The embodiment of the present application discloses a kind of information search method and system, is related to intelligent terminal technical field.The described method includes:Obtain the vocal print of terminal speech search instruction;Judge whether the vocal print is terminal user;If so, perform described search instruction.The information search method and system of the application, the vocal print instructed by obtaining phonetic search, verification vocal print performs search instruction again, to ensure the security of information and improve the convenience of information searching, improves user experience.

Description

A kind of information search method and system
Technical field
This application involves intelligent terminal technical field, more particularly to information search method and system.
Background technology
With the rapid development of Internet technology and mobile communication technology, work, life and the intelligent terminal breath of people cease It is related.At present, compared to other electronic equipments, mobile terminal (for example, portable electric appts) often stores substantial amounts of People's information.However, the bulk information security risk that not only existence information is revealed of portable electric appts storage, but also be not easy to User fast checks customizing messages.For example, when user needs the picture using identity information, due to the pictorial information mistake of storage More, user is difficult to the picture for quickly searching identity information.Currently, although intelligent terminal can look into information classification storage Look for, still, information classification cannot limit checking for non-user, and privacy information lacks necessary safeguard protection.
Accordingly, it is desired to provide a kind of information search method and system, the vocal print instructed by obtaining phonetic search, verification sound Line performs search instruction again, to ensure the security of information and improve the convenience of information searching, improves user experience.
The content of the invention
, should according to the application's in a first aspect, some embodiments of the present application provide a kind of information searching method For in terminal (for example, electronic equipment), the method may include:Obtain the vocal print of terminal speech search instruction;Judge institute State whether vocal print is terminal user;If so, perform described search instruction.
In certain embodiments, the method may further include:If it is not, lock the terminal.
In certain embodiments, the execution described search instruction further comprises:Obtain the voice of terminal searching instruction; Determine the semanteme of the voice;Search for the hiding information of the semantic association;Show the hiding information.
In certain embodiments, the method may further include:Obtain information;Identify privacy information;Hide described Privacy information.
In certain embodiments, the method may further include:The label of the privacy information is set.
In certain embodiments, the method may further include:According to the corresponding user information of the vocal print, screening With the hiding information of user-association.
In certain embodiments, connection track unlock includes:According to the semanteme, attaching information is analyzed;According to institute Attaching information is stated, screens the hiding information.
In certain embodiments, the method may further include:Store the vocal print of second user;Vocal print described in certification It is consistent with second user information;Search and the associated information of second user.
In certain embodiments, the vocal print authority of the second user is less than the vocal print authority of the terminal user.
According to the second aspect of the application, there is provided a system, including:One memory, is configured as storage data And instruction;One is established the processor to communicate with memory, wherein, when performing the instruction in memory, the processor quilt It is configured to:Obtain the vocal print of terminal speech search instruction;Judge whether the vocal print is terminal user;If so, searched described in performing Suo Zhiling.
Therefore, according to the information search method and system of some embodiments of the present application, instructed by obtaining phonetic search Vocal print, verification vocal print perform search instruction again, to ensure the security of information and improve the convenience of information searching, improve use Experience at family.
Brief description of the drawings
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of attached drawing reference implementation example, In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram that the termination function provided according to some embodiments of the present application configures.
Fig. 3 is the exemplary process diagram of the information concealing method provided according to some embodiments of the present application.
Fig. 4 is the exemplary process diagram of the information search method provided according to some embodiments of the present application.
Fig. 5 is the exemplary process diagram of the method for information display provided according to some embodiments of the present application.
Embodiment
It is described as having the right the application defined in requirement and its equivalent easy to Integrated Understanding below with reference to attached drawing Various embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the application The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the attached drawing in the application some embodiments, the technical solution in the embodiment of the present application is carried out clear Chu, be fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments. Based on the embodiment in the application, those of ordinary skill in the art are obtained all without making creative work Other embodiment, shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment , and it is not intended to be limiting the application." one " of the embodiment of the present application and singulative used in the attached claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.Also It should be appreciated that term "and/or" used herein refer to and list items purposes comprising one or more mutually bindings it is any or All possible combinations.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without examining Worry order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone, PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device (VR) and one or more of combinations in wearable device etc..According to some embodiments of the present application, the wearable device Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothes Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. in one or more of combinations.The application's In some embodiments, the electronic equipment can be flexible, be not limited to the said equipment, or can be in above-mentioned various equipment One or more of combinations.In this application, term " user " may indicate that using the people of electronic equipment or using electronic equipment Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of information search method and system.For the ease of understanding the embodiment of the present application, with It is lower that the embodiment of the present application is described in detail in refer to the attached drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can be omitted one or more elements, or can be into one Step includes one or more other elements.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and secondary or physical bond 117).The circuit can also be realized between one or more elements in electronic equipment 110 communication (for example, obtain and/or Send data).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP, Application Processor) and communication processor (Communication Processor).As an example, processor 112 can perform with the control of one or more elements of electronic equipment 110 and/or data processing (for example, locking electronic equipment Deng operation).
Memory 113 can store data.The data can include other with one or more of electronic equipment 110 The relevant instruction of element or data.For example, the data can include the initial data of 112 before processing of processor, intermediate data And/or the data after processing.Memory 113 can include impermanent memory memory and/or permanent memory memory.Make For example, memory 113 can store the iris information of user, voiceprint, pictorial information etc..
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap Include kernel, middleware, Application Programming Interface (API, Application Programming Interface) and/or using journey Sequence (or " application ").
At least a portion of the kernel, the middleware or the Application Programming Interface can include operating system (OS, Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middle Part, Application Programming Interface and application program) in realize operation or function system resource (for example, bus 111, processor 112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described should One or more elements of electronic equipment 110 are accessed with programming interface or the application program to control or management system resource.
The middleware can be as the intermediate layer of data transfer.The data transfer can allow Application Programming Interface or Application program is with the kernel communication exchanging data.As an example, the middleware can be handled from the application program One or more task requests of acquisition.For example, the middleware can distribute electronic equipment to one or more application program The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or Multiple tasks are asked.The Application Programming Interface can be that the application program is used to control from the kernel or the middleware The interface of function is provided.The Application Programming Interface can also include one or more interfaces or function (for example, instruction).It is described Function can be used for starting control, data channel control, security control, communication control, document control, window control, text control System, image procossing, information processing etc..
As an example, memory 113 can include Tee OS storages (Trusted Execution Environment Operating System), cell phone system memory, mobile phone memory card etc..The Tee OS storages can be that safe storage is empty Between, for storing security information (for example, iris information etc.).As an example, when electronic equipment is lost, the letter of Tee OS storages Breath can not be cracked, so as to ensure the security of iris information.The cell phone system memory can include mobile phone running memory With mobile phone inoperative memory etc..The inoperative memory can be the ROM (Read Only Memory) of mobile phone.The mobile phone is deposited Card storage can include SD card (Secure Digital Memory Card), Micro SD cards, Mini SD cards, TF card (Trans Flash Card), CF cards (Compact Flash Card), mmc card (MultiMedia Card), RS-MMC cards, M2 cards (Memory Stick Micro), MS cards etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110 Instruction or data.Input/output module 114 can also be defeated by the instruction or data that are obtained from the other elements of electronic equipment 110 Go out to user or external equipment.In certain embodiments, input/output module 114 can include input unit, and user can lead to Cross the input unit input information or instruction.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image, Video, icon and/or symbol etc., or several combinations).Display 115 can include liquid crystal display (LCD, Liquid Crystal Display), light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display or electric paper display etc., or several combinations.Display 115 can include display Screen, touch-screen etc..The display screen can show information.In certain embodiments, display 115 can show virtual key.Institute Information input by user can be obtained by stating touch-screen.Display 115 can be obtained by the touch-screen and inputted.The input can With including touch input, gesture input, action input, close to input, the input of electronic pen or user's body part (for example, outstanding Stopping transportation enters).
Communication module 116 can configure the communication between equipment.In certain embodiments, network environment 100 can be into one Step includes electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other equipment (example Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can pass through wireless communication or cable modem Letter is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The wireless communication can include microwave communication and/or satellite communication etc..The wireless communication can include honeycomb Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA (CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd Generation Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), wideband code division multiple access (WCDMA, Wideband Code Division Multiple Access), Universal Mobile Communication System (UMTS, Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless Broadband) etc., or several combinations.According to some embodiments of the present application, the wireless communication can include wireless local Net (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, Body Area Network) etc., or several combinations.According to some embodiments of the present application, the wire communication can include Global Navigation Satellite System (Glonass/GNSS, Global Navigation Satellite System), global positioning system System (GPS, Global Position System), Beidou navigation satellite system or Galileo (European Global Satellite Navigation System) Deng.The wire communication can include Universal Serial Bus (USB, Universal Serial Bus), high-definition media interface (HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend Standard 232), and/or plain old telephone service (POTS, Plain Old Telephone Service) etc. in one Kind, or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realities Apply in example, user can be with the function of self-defined secondary or physical bond 117.As an example, secondary or physical bond 117 can send instruction.Described instruction It can include starting information search instruction, the instruction of certification user information etc..The certification user information can include iris recognition, Recognition of face, Application on Voiceprint Recognition, fingerprint recognition, hand vein recognition etc., for example, the iris recognition can include writing during iris typing Iris information of user etc. is read when the iris information of user, iris verification.
In certain embodiments, electronic equipment 110 may further include sensor.The sensor can be included but not It is limited to photosensitive sensor, acoustic sensor, gas sensor, chemical sensor, voltage sensitive sensor, temp-sensitive sensor, fluid to pass Sensor, biology sensor, laser sensor, Hall sensor, intelligence sensor, position sensor etc., or several combinations.
In certain embodiments, electronic equipment 110 may further include infrared equipment, image capture device, vocal print and know Other device etc..As an example, the infrared equipment can identify by infrared ray mode of delivery, and blink, watch identification etc. attentively The information of technical limit spacing eyes.For example, the infrared equipment is acted come certification user information by gathering the blink of user.As Example, described image collecting device can include camera, iris device etc..The camera can realize the work(such as eyeball tracking Energy.The iris device can carry out authentication (for example, certification user information) using iris recognition technology.The iris dress Iris camera can be included by putting, and the iris camera can obtain iris information, and the iris information can be stored in In reservoir 113.The voice print identification device can be used for Application on Voiceprint Recognition, the Application on Voiceprint Recognition, that is, Speaker Identification (Speaker Recognition speaker) can be included and recognize (Speaker Identification) and speaker verification (Speaker Verification).In certain embodiments, the Application on Voiceprint Recognition can include text related (Text-Dependent) and text This unrelated (Text-Independent).
Network 120 can include communication network.The communication network can include computer network (for example, LAN (LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network Deng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes Business device 130, electronic equipment 140 etc.) send information.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment 110th, electronic equipment 140 etc.).In certain embodiments, when electronic equipment 110 is lost, server 130 can pass through network 120 send startup iris read write command to electronic equipment 110;When iris verification fails, server 130 can pass through network 120 further lock electronic equipment 110.In certain embodiments, when user information authentication success, server 130 can be to Electronic equipment 110 sends hiding information etc..In certain embodiments, server 130 can be to multiple terminals (for example, electronic equipment 110 and electronic equipment 140) send shared information.
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140 And/or server 130) in perform.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of or When multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server 130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, further Perform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothes Business device 130) requested function or other relevant one or more functions can be performed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide requested function Or service.As an example, electronic equipment 110 can use cloud computing, distributed computing technology and/or client-server end to calculate meter Calculate etc., or several combinations.In certain embodiments, can be included according to the difference of cloud computing service property, the cloud computing Public cloud, private clound and mixed cloud etc..In certain embodiments, when electronic equipment 110 is lost, electronic equipment 140 can be to Electronic equipment 110 sends positioning instruction, to obtain the positional information of electronic equipment 110.In certain embodiments, electronic equipment 110 can establish with electronic equipment 140 and be connected, for example, shared information etc..
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system can Each element can be combined on the premise of without departing substantially from the principle, or forms subsystem and be connected with other elements, To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environment System 100 may further include database.In another example electronic equipment 110 can not include secondary or physical bond 117 etc..It is all such The deformation of class, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the functions of the equipments provided according to some embodiments of the present application configure.Such as Fig. 2 institutes Show, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, determination unit 220, control unit 230, display unit 240, storage unit 250.
According to some embodiments of the present application, acquiring unit 210 can obtain information.In certain embodiments, the letter Breath can include but is not limited to text, picture, audio, video, action, gesture, sound, eyes (for example, iris information etc.), gas Breath, light etc., or several combinations.In certain embodiments, described information can include but is not limited to input information, system information And/or communication information etc..As an example, acquiring unit 210 can pass through the touch of input/output module 114, display 115 Screen, secondary or physical bond 117 and/or sensor obtain the input information of electronic equipment 110.The input information can include other equipment (for example, electronic equipment 140) and/or the input of user, for example, the input of key-press input, touch-control, gesture input, action input, remote Journey input, transmission input, eyes input, voice input, breath input, light input etc., or several combinations.The input information Obtaining widget can include but is not limited to infrared equipment, image capture device, sensor etc., or several combinations.As showing Example, acquiring unit 210 can obtain voice messaging etc. by sensor (for example, acoustic sensor etc.).
In certain embodiments, acquiring unit 210 can obtain the communication information by network 120.The communication information can With including application software information, signal of communication (for example, voice signal, vision signal etc.), short message etc..In some embodiments In, acquiring unit 210 can obtain system information by network 120, memory 113 and/or sensor.The system information can With include but not limited to the system mode of electronic equipment 110, presupposed information, memory 113 store information (for example, iris is recognized Demonstrate,prove information etc.) etc., or several combinations.
In certain embodiments, described information can include instruction.Described instruction includes user instruction and/or system command Deng, or several combinations.Described instruction can include triggering command, certification instruction, fill in instruction etc., or several combinations.Institute State certification instruction can include certification user information, phonetic search instructs etc..As an example, acquiring unit 210 can pass through thing Manage key 117 or virtual key obtains the phonetic search instruction of user.
According to some embodiments of the present application, determination unit 220 can determine information.In certain embodiments, determine single Member 220 can utilize close guarantor's function to determine whether action implementer and the user information that electronic equipment stores are consistent.The close guarantor Function can include password identification and/or biological identification technology.The password identification can include user setting numerical ciphers, Sound password, gesture password, track password, touch-control password etc..The bio-identification can include iris recognition, recognition of face, Fingerprint recognition, Application on Voiceprint Recognition, hand vein recognition etc..In certain embodiments, determination unit 220 can pass through Text region, image Identification technology determines the information content.In certain embodiments, determination unit 220 can be by contrasting input information and storage information Judge whether consistent.In certain embodiments, determination unit 220 can determine semanteme (for example, described by speech recognition technology The text of voice).Voice signal can be changed into corresponding text by the speech recognition technology by machine recognition and understanding Or order.
According to some embodiments of the present application, control unit 230 can be with control electronics.In certain embodiments, control Unit 230 processed can lock electronic equipment, unlock electronic equipment and/or foundation or the communication connection for disconnecting electronic equipment.It is described The function of limitation electronic equipment can be included by locking electronic equipment.As an example, when determination unit 220 determines the sound of phonetic entry When line and the inconsistent vocal print of terminal user, control unit 230 can lock electronic equipment, for example, locking the electronic equipment The functions such as touch screen, button, prevent action implementer from unlocking the electronic equipment.In certain embodiments, control unit 230 can When locking electronic equipment, further to send warning information.The warning information can be let out with warning terminal user existence information The security risk of dew.In certain embodiments, control unit 230 can be with hiding information.For example, when determination unit 220 determines letter Cease for privacy of user when, control unit 230 can be with hiding information.In certain embodiments, control unit 230 may search for letter Breath.For example, when determination unit 220 determines that the vocal print of phonetic entry is consistent with the vocal print of terminal user, control unit 230 can be with Perform search instruction.
According to some embodiments of the present application, display unit 240 can show information.In certain embodiments, display is single Member 240 can be a part for display 115.In certain embodiments, display unit 240 can show hiding information, example Such as, address list, short message, picture etc..In certain embodiments, display unit 240 can not display terminal user privacy information Deng.
According to some embodiments of the present application, storage unit 250 can store information.In certain embodiments, storage is single Member 250 can be a part for memory 113.In certain embodiments, storage unit 250 can store the privacy letter of user Breath, for example, identity information picture of the identity information picture of terminal user, second user etc..In certain embodiments, storage is single Member 250 can store voiceprint, for example, vocal print of the vocal print of terminal user, second user etc..The vocal print of the second user Authority is less than the vocal print authority of the terminal user.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, Unit may be combined on the premise of without departing substantially from the principle, or form submodule and connect with other units Connect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, processing module 200 can not include display unit 240 or storage unit 250, and corresponding function is performed by display 115 or memory 113 Deng.Suchlike deformation, within the protection domain of the application.
Fig. 3 is the exemplary process diagram of the information concealing method provided according to some embodiments of the present application.Such as Fig. 3 institutes Show, flow 300 can be realized by processing module 200.
301, information is obtained.Operation 301 can be realized by the acquiring unit 210 of processing module 200.In some implementations In example, described information can include but is not limited to text, picture, audio, video, action, gesture, sound, eyes (for example, rainbow Film information etc.), breath, light etc., or several combination.In certain embodiments, acquiring unit 210 can pass through input/output Module 114 obtains information.In certain embodiments, acquiring unit 210 can obtain information by image capture device.As showing Example, when user's using terminal camera shoots photo, acquiring unit 210 can obtain pictorial information.In certain embodiments, Acquiring unit 210 can obtain the communication information of terminal by communication module 116, for example, short message, message registration etc..
302, privacy information is identified.Operation 302 can be realized by the determination unit 220 of processing module 200.At some In embodiment, the privacy information can include the identity information (for example, identity card, passport etc.) of user, proprietary information (example Such as, deposit, wage etc.), cause information (for example, personal creation, job information) etc..In certain embodiments, determination unit 220 Whether the information that can determine to obtain by character recognition technology or image recognition technology is privacy information.As an example, determine Unit 220 can identify the text message in photo by character recognition technology, for example, determining to include " identification number ", " passport The photo of the text messages such as number " is privacy information.For example, determination unit 220 can identify short message by character recognition technology In text message, determine that the short message comprising " wage ", the text message such as " remaining sum " is privacy information.In another example determination unit 220 can explain the people information in identification photo by image recognition, for example, determining " one-by-one inch photograph ", " group photo " " taking pictures certainly " It is privacy information Deng the photo comprising face information.
303, the privacy information is hidden.Operation 303 can be single by the control unit 230 of processing module 200, display Member 240 is realized.In certain embodiments, control unit 230 can hide the privacy information, and display unit 240 can not be shown Show the privacy information.
According to some embodiments of the present application, flow 300 may further include the label for setting the privacy information. In some embodiments, the label (Tag) can include heading message and attaching information.As an example, the identity of terminal user A The label of license piece can include heading message " identity card " and attaching information " user A ".In another example the passport of second user B The label of photo can include heading message " passport " and attaching information " user B ".
It should be noted that the description for flow 300 above, only for convenience of description, can not be limited in the application Within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, may not carry on the back On the premise of from the principle, each operation is combined, or forms sub-process and other operative combinations, in implementation State the various modifications and variations in flow and the function progress form and details of operation.For example, flow 300 may further include Whether the information for judging to obtain is operation of privacy information etc..In another example flow 300 may further include setting privacy information The operation such as label.Suchlike deformation, within the protection domain of the application.
Fig. 4 is the exemplary process diagram of the information search method provided according to some embodiments of the present application.Such as Fig. 4 institutes Show, flow 400 can be realized by processing module 200.
401, the vocal print of terminal speech search instruction is obtained.Operation 401 can pass through the acquiring unit of processing module 200 210th, determination unit 220 and/or control unit 230 are realized.In certain embodiments, acquiring unit 210 can by input/it is defeated Go out the voice messaging that module 114 obtains terminal user.The voice messaging can be including search instruction etc..As an example, obtain The phonetic search that unit 210 can obtain terminal by microphone (microphone) instructs.In certain embodiments, determination unit 220 and/or control unit 230 can extract the characteristic information of phonetic search instruction.As an example, determination unit 220 and/ Or control unit 230 can extract the voiceprint of the phonetic search instruction by sound groove recognition technology in e.
402, judge whether the vocal print is terminal user.Operation 402 can pass through the determination unit of processing module 200 220 realize.In certain embodiments, determination unit 220 can carry out speaker verification to the vocal print, for example, one-to-one sentence Not described vocal print whether be terminal user vocal print.As an example, determination unit 220 can be by sound groove recognition technology in e to described Vocal print carries out pattern-recognition.The pattern-recognition can include arest neighbors method, hidden Markov model method (Hidden Markov Model, HMM), multinomial classifier methods, template matching method, neural net method is (for example, Multilayer Perception, footpath To basic function etc.), VQ clustering methods etc., or several combination.
If so, entering operation 403,403, described search instruction is performed.Operation 403 can pass through processing module 200 Control unit 230 is realized.In certain embodiments, when the vocal print is consistent with the vocal print of terminal user, control unit 230 can To instruct search information according to described search.
If it is not, entering operation 404,404, the terminal is locked.Operation 404 can pass through the control of processing module 200 Unit 230 processed is realized.In certain embodiments, when the vocal print of the vocal print and terminal user is inconsistent, end message exists Security risk, control unit 230 can be with locking terminals.In certain embodiments, control unit 230 can further perform alarm Prompting.
According to some embodiments of the present application, flow 400 may further include the vocal print of storage second user.At some In embodiment, authority that terminal user can search for second user opening imformation, for example, storage unit 250 can store the The vocal print of two users.As an example, determination unit 220 can verify acquisition vocal print and second user vocal print it is whether consistent. For example, if the vocal print obtained is consistent with the vocal print of second user, control unit 230 may search for and the associated letter of second user Breath.In another example if the vocal print and the vocal print of second user that obtain are inconsistent, control unit 230 can be with locking terminal.Described second The vocal print authority of user is less than the vocal print authority of the terminal user.If as an example, the vocal print and the sound of terminal user that obtain When line is consistent, control unit 230 may search for the information with the voice association, including terminal user or other users (for example, Second user) related information.
According to some embodiments of the present application, flow 400 may be performed simultaneously voice print verification and search instruction.In some realities Apply in example, when voice print verification is consistent, display unit 240 can show the information of search.As an example, when vocal print is used for terminal During family, display unit 240 can show the full detail of search.In another example when vocal print is second user, display unit 240 It can show the partial information of search, such as, with the associated information of second user.In certain embodiments, when voice print verification not When consistent, display unit 240 can not show the information of search.
It should be noted that the description for flow 400 above, only for convenience of description, can not be limited in the application Within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, may not carry on the back On the premise of from the principle, each operation is combined, or forms sub-process and other operative combinations, in implementation State the various modifications and variations in flow and the function progress form and details of operation.For example, flow 400 may be performed simultaneously behaviour Make 402 and operation 403, or first carry out operation 403, redo 402 etc..In another example flow 400 may further include and deposit Store up the operations such as the vocal print of second user, the vocal print for verifying second user.Suchlike deformation, the protection domain in the application Within.
Fig. 5 is the exemplary process diagram of the method for information display provided according to some embodiments of the present application.Such as Fig. 5 institutes Show, flow 500 can be realized by processing module 200.In certain embodiments, flow 500 can be operated in flow 400 A kind of 403 implementation.
501, the voice of terminal searching instruction is obtained.Operation 501 can pass through the acquiring unit 210 of processing module 200 Realize.In certain embodiments, acquiring unit 210 can obtain the voice that terminal searching instructs by input/output module 114 Information.As an example, the phonetic search that acquiring unit 210 can obtain terminal by microphone (microphone) instructs.
502, the semanteme of the voice is determined.Operation 502 can be realized by the determination unit 220 of processing module 200. In certain embodiments, determination unit 220 can determine the semanteme of the phonetic search instruction, and the semanteme can include described The text message of voice.As an example, the voice messaging can be converted to text by determination unit 220 by speech recognition technology This information.
503, the information of the semantic association is searched for.Operation 503 can pass through the control unit 230 of processing module 200 Realize.In certain embodiments, control unit 230 can be according to the semantic search information.Described information can include privacy Information, the privacy information can be provided with label information.As an example, control unit 230 can be according to the semantic text Label information corresponding to this information, searches for privacy information.In certain embodiments, when phonetic search command verification vocal print is eventually During end subscriber, control unit 230 can the semantic association hiding information.
504, described information is shown.Operation 504 can be by processing module 200 control unit 230, display unit 240 realize.In certain embodiments, when described information is not hidden, control unit 230 can be only aobvious with control display unit 240 Show the information of described search.When described information is hidden, control unit 230 be able to can be shown described with control display unit 240 Hiding information.In certain embodiments, when phonetic search command verification vocal print is terminal user, display unit 240 can be with Show the hiding information of the semantic association.
According to some embodiments of the present application, flow 500 may further include the hiding information of screening and user-association. In certain embodiments, when determination unit 220 determines the voiceprint that the vocal print of the phonetic search instruction is terminal user, control Unit 230 processed can screen the associated hiding information of the terminal user.As an example, when the phonetic search of second user instructs For " identity card ", determination unit 220 determines that the vocal print of " identity card " is second user, and control unit 230 may search for end Hold the information of the association " identity card " of storage;Control unit 230 can further screen the identity card picture of second user.
According to some embodiments of the present application, flow 500 may further include according to semanteme, analyze attaching information. In some embodiments, when the phonetic search instruction of terminal user be " my identity card ", determination unit 220 determine described in " I The vocal print of identity card " is terminal user, and determination unit 220 may further determine that the attaching information of " my identity card " is " I ", that is, correspond to the terminal user of vocal print;Control unit 230 may search for the information of the association " identity card " of terminal storage, And further screen the identity card picture of terminal user.
It should be noted that the description for flow 500 above, only for convenience of description, can not be limited in the application Within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, may not carry on the back On the premise of from the principle, each operation is combined, or forms sub-process and other operative combinations, in implementation State the various modifications and variations in flow and the function progress form and details of operation.For example, flow 500 may further include Screen hiding information etc..Suchlike deformation, within the protection domain of the application.
In conclusion according to the information search method and system of the embodiment of the present application, by obtaining phonetic search instruction Vocal print, verification vocal print performs search instruction again, to ensure the security of information and improve the convenience of information searching, improves user Experience.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in the present specification, term " comprising ", "comprising" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those Element, but also including other elements that are not explicitly listed, or further include as this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Also there are other identical element in process, method, article or equipment including the key element.
Finally, it is to be noted that, a series of above-mentioned processing are not only included with order described here in temporal sequence The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with To be completed by the relevant hardware of computer program instructions, the program can be stored in a computer-readable recording medium, The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic disc, CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with this Enclose, one of ordinary skill in the art will appreciate that realize all or part of flow of above-described embodiment, and will according to the application right Made equivalent variations are sought, still falls within and invents covered scope.

Claims (10)

1. a kind of information search method, including:
Obtain the vocal print of terminal speech search instruction;
Judge whether the vocal print is terminal user;
If so, perform described search instruction.
2. according to the method described in claim 1, further comprise:
If it is not, lock the terminal.
3. according to the method described in claim 1, the execution described search instruction further comprises:
Obtain the voice of terminal searching instruction;
Determine the semanteme of the voice;
Search for the hiding information of the semantic association;
Show the hiding information.
4. according to the method described in claim 3, further comprise:
Obtain information;
Identify privacy information;
Hide the privacy information.
5. according to the method described in claim 4, further comprise:
The label of the privacy information is set.
6. according to the method described in claim 3, further comprise:
According to the corresponding user information of the vocal print, screening and the hiding information of user-association.
7. according to the method described in claim 3, connection track unlock includes:
According to the semanteme, attaching information is analyzed;
According to the attaching information, the hiding information is screened.
8. according to the method described in claim 1, further comprise:
Store the vocal print of second user;
Vocal print described in certification is consistent with second user information;
Search and the associated information of second user.
9. according to the method described in claim 8, the vocal print that the vocal print authority of the second user is less than the terminal user is weighed Limit.
A 10. system, it is characterised in that including:
One memory, is configured as storage data and instruction;
One is established the processor to communicate with memory, wherein, when performing the instruction in memory, the processor is configured For:
Obtain the vocal print of terminal speech search instruction;
Judge whether the vocal print is terminal user;
If so, perform described search instruction.
CN201711104137.1A 2017-11-10 2017-11-10 A kind of information search method and system Pending CN108010519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711104137.1A CN108010519A (en) 2017-11-10 2017-11-10 A kind of information search method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711104137.1A CN108010519A (en) 2017-11-10 2017-11-10 A kind of information search method and system

Publications (1)

Publication Number Publication Date
CN108010519A true CN108010519A (en) 2018-05-08

Family

ID=62052294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711104137.1A Pending CN108010519A (en) 2017-11-10 2017-11-10 A kind of information search method and system

Country Status (1)

Country Link
CN (1) CN108010519A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657444A (en) * 2018-12-29 2019-04-19 上海智臻智能网络科技股份有限公司 Safe verification method and device, storage medium, terminal
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055327A1 (en) * 2003-09-08 2005-03-10 International Business Machines Corporation Uniform search system and method for selectively sharing distributed access-controlled documents
CN104937603A (en) * 2013-01-10 2015-09-23 日本电气株式会社 Terminal, unlocking method, and program
CN105653673A (en) * 2015-12-29 2016-06-08 小米科技有限责任公司 Information searching method and apparatus
CN105895096A (en) * 2016-03-30 2016-08-24 乐视控股(北京)有限公司 Identity identification and voice interaction operating method and device
CN105993172A (en) * 2013-11-26 2016-10-05 At&T知识产权部有限合伙公司 Manipulation of media content to overcome user impairments
CN106453859A (en) * 2016-09-23 2017-02-22 维沃移动通信有限公司 Voice control method and mobile terminal
CN106485225A (en) * 2016-10-13 2017-03-08 杭州维慕德科技有限公司 Identity card checking method and system based on biological nature identification
US20170094357A1 (en) * 2014-05-14 2017-03-30 Samsung Electronics Co., Ltd. Display apparatus, server, system and information-providing methods thereof
CN106935240A (en) * 2017-03-24 2017-07-07 百度在线网络技术(北京)有限公司 Voice translation method, device, terminal device and cloud server based on artificial intelligence

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055327A1 (en) * 2003-09-08 2005-03-10 International Business Machines Corporation Uniform search system and method for selectively sharing distributed access-controlled documents
CN104937603A (en) * 2013-01-10 2015-09-23 日本电气株式会社 Terminal, unlocking method, and program
CN105993172A (en) * 2013-11-26 2016-10-05 At&T知识产权部有限合伙公司 Manipulation of media content to overcome user impairments
US20170094357A1 (en) * 2014-05-14 2017-03-30 Samsung Electronics Co., Ltd. Display apparatus, server, system and information-providing methods thereof
CN105653673A (en) * 2015-12-29 2016-06-08 小米科技有限责任公司 Information searching method and apparatus
CN105895096A (en) * 2016-03-30 2016-08-24 乐视控股(北京)有限公司 Identity identification and voice interaction operating method and device
CN106453859A (en) * 2016-09-23 2017-02-22 维沃移动通信有限公司 Voice control method and mobile terminal
CN106485225A (en) * 2016-10-13 2017-03-08 杭州维慕德科技有限公司 Identity card checking method and system based on biological nature identification
CN106935240A (en) * 2017-03-24 2017-07-07 百度在线网络技术(北京)有限公司 Voice translation method, device, terminal device and cloud server based on artificial intelligence

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657444A (en) * 2018-12-29 2019-04-19 上海智臻智能网络科技股份有限公司 Safe verification method and device, storage medium, terminal
CN109657444B (en) * 2018-12-29 2021-06-25 上海智臻智能网络科技股份有限公司 Security verification method and device, storage medium and terminal
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN110659512B (en) * 2019-09-27 2022-02-11 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN107609914A (en) A kind of intelligent menu design method and system
CN107425579A (en) A kind of intelligent charging method and system
CN107704849A (en) The face identification method and system of double verification function
CN108009140A (en) A kind of end message edit methods and system
CN107256353A (en) Possesses the display methods of privacy protection function
CN109472122A (en) A kind of multimedia messages reminding method and system
CN107315681A (en) Application program self-starting test system, medium and method
CN107358179A (en) A kind of living management system, medium and method based on iris verification
CN107506721A (en) A kind of more method for collecting iris and system
CN107423585A (en) The concealed application method and system of a kind of application
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN107341378A (en) For the method for the access right for setting application
CN107085678A (en) A kind of display methods and its terminal
CN107944245A (en) A kind of eyeball tracking iris unlocking method and system
CN108010519A (en) A kind of information search method and system
CN107862518A (en) A kind of method of payment and system based on terminal location
CN107404484A (en) A kind of method, apparatus and system of mechanical release authority
CN107704843A (en) A kind of simple eye iris verification method and system
CN206908680U (en) Intelligent terminal with secure log function
CN107592398A (en) A kind of intelligent information storage method and system
CN107835117A (en) A kind of instant communicating method and system
CN108897479A (en) A kind of terminal touch control method and system
CN108021350A (en) A kind of terminal output volume method of adjustment and system
CN107402690A (en) A kind of global collecting method and system
CN107563162A (en) A kind of concealed unlocking method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180508